咨询与建议

限定检索结果

文献类型

  • 800 篇 会议
  • 131 篇 期刊文献

馆藏范围

  • 931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 823 篇 工学
    • 807 篇 软件工程
    • 547 篇 计算机科学与技术...
    • 22 篇 控制科学与工程
    • 11 篇 信息与通信工程
    • 7 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 3 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 纺织科学与工程
  • 102 篇 理学
    • 88 篇 数学
    • 10 篇 系统科学
    • 8 篇 统计学(可授理学、...
    • 4 篇 化学
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 地质学
  • 53 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 21 篇 工商管理
    • 21 篇 图书情报与档案管...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 3 篇 法学
    • 3 篇 社会学

主题

  • 166 篇 design
  • 155 篇 languages
  • 96 篇 performance
  • 74 篇 computer program...
  • 56 篇 algorithms
  • 45 篇 experimentation
  • 42 篇 computer program...
  • 39 篇 verification
  • 36 篇 reliability
  • 34 篇 object oriented ...
  • 27 篇 java programming...
  • 26 篇 functional progr...
  • 25 篇 program synthesi...
  • 24 篇 probabilistic pr...
  • 22 篇 java
  • 19 篇 domain-specific ...
  • 19 篇 theory
  • 19 篇 concurrency
  • 17 篇 compilers
  • 17 篇 type systems

机构

  • 15 篇 carnegie mellon ...
  • 13 篇 princeton univ p...
  • 11 篇 univ texas austi...
  • 10 篇 univ michigan an...
  • 10 篇 rice univ housto...
  • 10 篇 purdue univ w la...
  • 10 篇 univ washington ...
  • 10 篇 univ calif berke...
  • 9 篇 univ wisconsin m...
  • 9 篇 harvard univ cam...
  • 9 篇 univ penn philad...
  • 9 篇 stanford univ st...
  • 8 篇 yale univ new ha...
  • 8 篇 cornell univ ith...
  • 8 篇 univ chicago il ...
  • 7 篇 mit cambridge ma...
  • 7 篇 northeastern uni...
  • 7 篇 microsoft resear...
  • 6 篇 microsoft res re...
  • 6 篇 microsoft res re...

作者

  • 11 篇 walker david
  • 10 篇 dillig isil
  • 9 篇 chlipala adam
  • 8 篇 solar-lezama arm...
  • 8 篇 chaudhuri swarat
  • 7 篇 august david i.
  • 7 篇 shao zhong
  • 7 篇 gulwani sumit
  • 7 篇 sarkar vivek
  • 6 篇 wang xinyu
  • 6 篇 grossman dan
  • 6 篇 adl-tabatabai al...
  • 6 篇 aiken alex
  • 6 篇 foster nate
  • 6 篇 bacon david f.
  • 6 篇 myers andrew c.
  • 6 篇 mezini mira
  • 6 篇 mahlke scott
  • 6 篇 bodik rastislav
  • 5 篇 mckinley kathryn...

语言

  • 852 篇 英文
  • 78 篇 其他
  • 1 篇 中文
检索条件"任意字段=ACM SIGPLAN 95 Conference on Programming Language Design and Implementation"
931 条 记 录,以下是851-860 订阅
排序:
Semantics of program dependence
收藏 引用
sigplan Notices (acm Special Interest Group on programming languages) 1989年 第7期24卷 13-27页
作者: Cartwright, Robert Felleisen, Matthias Rice Univ United States
Optimizing and parallelizing compilers for procedural languages rely on various forms of program dependence graphs (pdgs) to express the essential control and data dependences among atomic program operations. In this ... 详细信息
来源: 评论
Fast Algorithms for Dyck-CFL-Reachability with Applications to Alias Analysis  13
Fast Algorithms for Dyck-CFL-Reachability with Applications ...
收藏 引用
acm sigplan conference on programming language design and implementation
作者: Qirun Zhang Michael R. Lyu Hao Yuan Zhendong Su The Chinese University of Hong Kong BOPU Technologies University of California
The context-free language (CFL) reachability problem is a well-known fundamental formulation in program analysis. In practice, many program analyses, especially pointer analyses, adopt a restricted version of CFL-reac... 详细信息
来源: 评论
A design and Verification Methodology for Secure Isolated Regions
收藏 引用
acm sigplan NOTICES 2016年 第6期51卷 665-681页
作者: Sinha, Rohit Costa, Manuel Lal, Akash Lopes, Nuno P. Rajamani, Sriram Seshia, Sanjit A. Vaswani, Kapil Univ Calif Berkeley Berkeley CA 94720 USA Microsoft Res London England Microsoft Res Bengaluru Karnataka India
Hardware support for isolated execution (such as Intel SGX) enables development of applications that keep their code and data confidential even while running on a hostile or compromised host. However, automatically ve... 详细信息
来源: 评论
End-to-End Verification of Information-Flow Security for C and Assembly Programs
收藏 引用
acm sigplan NOTICES 2016年 第6期51卷 648-664页
作者: Costanzo, David Shao, Zhong Gu, Ronghui Yale Univ New Haven CT 06520 USA
Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. A promising step toward conquering this challenge is ... 详细信息
来源: 评论
Laws of concurrent programming  14
Laws of concurrent programming
收藏 引用
Proceedings of the 35th acm sigplan conference on programming language design and implementation
作者: Tony Hoare Microsoft Research Cambridge United Kingdom
The talk extends the Laws of programming [1] by four laws governing concurrent composition of programs. This operator is associative and commutative and distributive through union; and it has the same unit (do nothing... 详细信息
来源: 评论
A General Constraint-centric Scheduling Framework for Spatial Architectures  13
A General Constraint-centric Scheduling Framework for Spatia...
收藏 引用
acm sigplan conference on programming language design and implementation
作者: Tony Nowatzki Michael Sartin-Tarm Lorenzo De Carli Karthikeyan Sankaralingam Cristian Estan Behnam Robatmili University of Wisconsin-Madison Broadcom Qualcomm Research Silicon Valley
Specialized execution using spatial architectures provides energy efficient computation, but requires effective algorithms for spatially scheduling the computation. Generally, this has been solved with architecture-sp... 详细信息
来源: 评论
Dependence analysis for pointer variables
收藏 引用
sigplan Notices (acm Special Interest Group on programming languages) 1989年 第7期24卷 28-40页
作者: Horwitz, Susan Pfeiffer, Phil Reps, Thomas Univ of Wisconsin United States
Our concern is how to determine data dependences between program constructs in programming languages with pointer variables. We are particularly interested in computing data dependences for languages that manipulate h... 详细信息
来源: 评论
XMem: Type-safe, transparent, shared memory for cross-runtime communication and coordination
收藏 引用
acm sigplan NOTICES 2008年 第6期43卷 327-338页
作者: Wegiel, Michal Krintz, Chandra Univ Calif Santa Barbara Dept Comp Sci Santa Barbara CA 93106 USA
Developers commonly build contemporary enterprise applications using type-safe, component-based platforms, such as J2EE, and architect them to comprise multiple tiers, such as a web container, application server, and ... 详细信息
来源: 评论
P: Safe Asynchronous Event-Driven programming  13
P: Safe Asynchronous Event-Driven Programming
收藏 引用
acm sigplan conference on programming language design and implementation
作者: Ankush Desai Vivek Gupta Ethan Jackson Shaz Qadeer Sriram Rajamani Damien Zufferey Microsoft IST Austria
We describe the design and implementation of P, a domain-specific language to write asynchronous event driven code. P allows the programmer to specify the system as a collection of interacting state machines, which co... 详细信息
来源: 评论
Shangri-la: Achieving high performance from compiled network applications while enabling ease of programming
收藏 引用
acm sigplan NOTICES 2005年 第6期40卷 224-236页
作者: Chen, MK Li, XF Lian, RQ Lin, JH Liu, LX Liu, T Ju, R Intel Corp Microproc Technol Labs Santa Clara CA 95051 USA Intel China Res Ctr Ltd Beijing Peoples R China Chinese Acad Sci Inst Comp Technol Beijing Peoples R China
programming network processors is challenging. To sustain high line rates, network processors have extremely tight memory access and instruction budgets. Achieving desired performance has traditionally required hand-c... 详细信息
来源: 评论